首页> 外文期刊>Wireless Networks >Lightweight PUF based authentication scheme for fog architecture
【24h】

Lightweight PUF based authentication scheme for fog architecture

机译:基于轻量级PUF的FOG架构认证方案

获取原文
获取原文并翻译 | 示例

摘要

Fog computing improves efficiency and reduces the amount of bandwidth to the cloud. In many use cases, the internet of things (IoT) devices do not know the fog nodes in advance. Moreover, as the fog nodes are often placed in open publicly available places, they can be easily captured. Therefore, it should be ensured that even if the key material is leaked from the fog devices, the previously generated session keys and the identity of the devices can be kept secret, i.e. satisfying anonymity, unlinkability, perfect forward secrecy and resistance against stolen devices attack. Such demands require a multi-factor authentication scheme, which is typically done by providing input of the user with password or biometric data. However, in real use case scenarios, IoT devices should be able to automatically start the process without requiring such manual interaction and also fog devices need to autonomously operate. Therefore, this paper proposes a physical unclonable function (PUF) based mutual authentication scheme, being the first security scheme for a fog architecture, capable of providing simultaneously all these suggested security features. In addition, we also show the resistance against other types of attacks like synchronization and known session specific temporary information attack. Moreover, the scheme only relies on symmetric key based operations and thus results in very good performance, compared to the other fog based security systems proposed in literature.
机译:雾计算提高了效率并降低了云带宽的数量。在许多用例中,事物互联网(IOT)设备不提前知道雾节点。此外,由于雾节点通常被放置在公开可用的地方,因此可以容易地捕获它们。因此,应该确保即使关键材料从雾设备泄漏,先前生成的会话密钥和设备的身份也可以保持秘密,即满足匿名,不可透明的,不可用,完美的前向保密性和对抗盗窃设备攻击的抵抗。这种需求需要多因素认证方案,其通常通过提供具有密码或生物识别数据的用户的输入来完成。但是,在实际用例方案中,IOT设备应该能够自动启动该过程而无需此类手动交互,而且雾设备还需要自动操作。因此,本文提出了一种基于物理不可渗透的函数(PUF)的相互认证方案,是雾架构的第一安全方案,其能够同时提供所有这些建议的安全功能。此外,我们还显示了与其他类型的攻击相同的抵抗,如同步和已知会话特定的临时信息攻击。此外,该方案仅依赖于基于对称的密钥的操作,因此与文献中提出的其他FOG的安全系统相比,实现了非常好的性能。

著录项

获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号